Abstract
In this paper, we describe: (i) how agents can protect information from other agents and (ii) how servers that support agent cooperation can help in this process. We show that agents' data security policies can be encoded through three structures called metaknowledge, history and agent security tables. We develop a framework that allows arbitrary metalanguages and history maintenance policies to be “plugged in”, and develop complexity results, including polynomial (efficiently computable) approximations.
Partially supported by the Army Research Office under grant DAAH-04-95-10174, by the Air Force Office of Scientific Research under grant F49620-93-1-0065, by ARPA/Rome Labs contract Nr. F30602-93-C-0241 (Order Nr. A716), and by an NSF Young Investigator award IRI-93-57756.
Preview
Unable to display preview. Download preview PDF.
References
S. Adali, K.S. Candan, Y. Papakonstantinou and V.S. Subrahmanian. (1996) Query Processing in Distributed Mediated Systems, in: Proc. 1996 ACM SIGMOD Conf. on Management of Data, Montreal, Canada, June 1996.
K.Apt, H. Blair and9 A. Walker. (1988) Towards a theory of declarative knowledge, in J. Minker (ed.) “Foundations of Deductive Databases and Logic Programming”, pps 89–148, Morgan Kaufman.
K. Arisha, S. Kraus, F. Ozcan, R. Ross and V.S. Subrahmanian (1998). IMPACT: The Interactive Maryland Platform for Agents Collaborating Together (submitted).
E. Bertino, C. Bettini, E. Ferrari and P. Samarati. (1996) A Temporal Access Control Mechanism for Database Systems, IEEE Trans. on Knowledge and Data Engineering, Vol. 8, Nr. 1, pps 67–80
E. Bertino, P. Samarati and S. Jajodia. Authorizations in relational database management systems, Proc. 1st ACM Conf. on Computer and Comm. Security, Fairfax, VA, Nov. 1993.
P. Bonatti, S. Kraus and V.S. Subrahmanian. Foundations of Secure Deductive Databases, IEEE Transactions on Knowledge and Data Engineering, 7,3, June 1995.
A. Brink, S. Marcus and V.S. Subrahmanian. Heterogeneous Multimedia Reasoning. IEEE Computer, 28(9):33–39, Sep. 1995.
K.S. Candan, S. Jajodia and V.S. Subrahmanian. (1996) Secure Mediated Databases, in: Proc. 1996 Intl. Conf. on Data Engineering, Feb. 1996, New Orleans, LA.
S. Castano, M.G. Fugini, G. Martella, and P. Samarati, Database Security, Addison-Wesley, 1995.
R.G.G. Cattell. (ed.) (1993) The Object Database Standard: ODMG-93, Morgan Kaufmann.
D. M. Chess (1996). Security in Agents Systems,http://www.av.ibm.com/InsideTheLab/Bookshelf/ScientificPapers/.
The CORBAservices Specifications, 1997. http://www.omg.org/library/corbserv.htm
M. Crosbie and E. Spafford (1995). Applying genetic programming to intrusion detection. In Proceedings of the AAAI 1995 Fall Symposium series, November 1995.
T. Eiter, V.S.Subrahmanian and G. Pick. (1998) Heterogeneous Active Agents, draft manuscript, 115 pages.
L. N. Foner (1996). A Security Architecture for Multi-Agent Matchmaking, Second International Conference on Multi-Agent Systems (ICMAS96), Japan.
M. Gelfond and V. Lifschitz. (1988) The Stable Model Semantics for Logic Programming, in: Proc. 5th International Conference and Symposium on Logic Programming, ed R. A. Kowalski and K. A. Bowen, pp 1070–1080.
G. Gottlob (1992). Complexity results for nonmonotonic logics, Journal of Logic and Computation, 2(3):397–425, June 1992.
G. Gottlob. (1995) The complexity of default reasoning under the stationary fixed point semantics, Information and Computation, 121(1):81–92, 15 August 1995.
S. Jajodia and R. Sandhu, Toward a Multilevel Relational Data Model, in Proc. ACM-SIGMOD Conf., Denver, May 1991.
J.W. Lloyd. (1987) Foundations of Logic Programming, Springer.
J. Lu, G. Moerkotte, J. Schue, and V.S. Subrahmanian. Efficient Maintenance of Materialized Mediated Views, in: Proc. 1995 ACM SIGMOD Conf. on Management of Data, San Jose, CA, May 1995.
J. Lu, A. Nerode and V.S. Subrahmanian. Hybrid Knowledge Bases, IEEE Transactions on Knowledge and Data Engineering, 8, 5, pp 773–785, Oct. 1996. Released as a University of Maryland Technical Report, Summer 1993.
T. F. Lunt. Access control policies for database systems. In C. E. Landwehr,editor, Database Security II: Status and Prospects, pages 41–52. North-Holland,Amsterdam, 1989.
S. Marcus and V.S. Subrahmanian. Foundations of Multimedia Database Systems, Journal of the ACM, Vol. 43, 3, pp 474–523, 1996.
W. Marek, A. Nerode and J.B. Remmel. (1990) Non-Monotonic Rule Systems 1, 2, Annals of Mathematics and Artificial Intelligence, pps 241–273.
A. Martelli and U. Montanari. (1982) An Efficient Unification Algorithm, ACM Trans. on Prog. Lang. and Systems, 4, 2, pps 258–282.
J. Millen and T. Lunt, Security for Object-Oriented Database Systems, in Proc. of the IEEE Symposium on Research in Security and Privacy, Oakland, California, May 1992.
R. Moore. Semantical Considerations on Nonmonotonic Logics. Artificial Intelligence, 25:75–94, 1985.
T. Przymusinski. (1988) On the declarative semantics of deductive databases and logic programs, in J. Minker (ed.) “Foundations of Deductive Databases and Logic Programming”, pps 193–216, Morgan Kaufman.
C. Thirunavukkarasu, T. Finin and J. Mayfield (1995). Secret Agents — A Security Architecture for the KQML Agent Communication Language, Intelligent Information Agents Workshop held in conjunction with Fourth International Conference on Information and Knowledge Management CIKM'95.
T. Sander, C. Tschudin. Protecting mobile agents against malicious hosts. In G. Vigna (ed.) Mobile Agents and Security, LNCS, to appear.
M. Winslett, K. Smith, and X. Qian, Formal Query Languages for Secure Relational Databases, ACM-TODS, 19, 4, pp. 626–662, December 1994.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bonatti, P.A., Kraus, S., Salinas, J., Subrahmanian, V.S. (1998). Data-security in heterogeneous agent systems. In: Klusch, M., Weiß, G. (eds) Cooperative Information Agents II Learning, Mobility and Electronic Commerce for Information Discovery on the Internet. CIA 1998. Lecture Notes in Computer Science, vol 1435. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053692
Download citation
DOI: https://doi.org/10.1007/BFb0053692
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64676-1
Online ISBN: 978-3-540-69109-9
eBook Packages: Springer Book Archive